TY - GEN
T1 - Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing
AU - Zhang, Shuang
AU - Wan, Xinyu
AU - Kong, Deqi
AU - Guo, Yangming
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/11
Y1 - 2020/11
N2 - With the application of virtualization and multi-core processor in embedded system, the computing capacity of embedded system has been improved comprehensively, but it is also faced with malicious attacks against virtualization technology. First, it was analyzed the security requirements of each layer of embedded virtualization computing platform. Aiming at the security requirements, it was proposed the security architecture of embedded virtualization computing platform based on trusted computing module. It was designed the hardware trusted root on the hardware layer, the virtualization trusted root on the virtual machine manager layer, trusted computing component and security function component on guest operation system layer. Based on the trusted roots, it was built the static extension of the trusted chain on the platform. This security architecture can improve the active security protection capability of embedded virtualization computing platform.
AB - With the application of virtualization and multi-core processor in embedded system, the computing capacity of embedded system has been improved comprehensively, but it is also faced with malicious attacks against virtualization technology. First, it was analyzed the security requirements of each layer of embedded virtualization computing platform. Aiming at the security requirements, it was proposed the security architecture of embedded virtualization computing platform based on trusted computing module. It was designed the hardware trusted root on the hardware layer, the virtualization trusted root on the virtual machine manager layer, trusted computing component and security function component on guest operation system layer. Based on the trusted roots, it was built the static extension of the trusted chain on the platform. This security architecture can improve the active security protection capability of embedded virtualization computing platform.
KW - Cyber Security
KW - Embedded Computing Platform
KW - Trusted Computing
KW - Virtualization
UR - http://www.scopus.com/inward/record.url?scp=85100556894&partnerID=8YFLogxK
U2 - 10.1109/DSA51864.2020.00043
DO - 10.1109/DSA51864.2020.00043
M3 - 会议稿件
AN - SCOPUS:85100556894
T3 - Proceedings - 2020 7th International Conference on Dependable Systems and Their Applications, DSA 2020
SP - 246
EP - 250
BT - Proceedings - 2020 7th International Conference on Dependable Systems and Their Applications, DSA 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 7th International Conference on Dependable Systems and Their Applications, DSA 2020
Y2 - 28 November 2020 through 29 November 2020
ER -